Computer Studies Questions
Question 251:
Running other software on idle computer without the knowledge of the organisation is called theft of ____________
View Answer & ExplanationQuestion 252:
Sensitive data can be protected from prying eyes using ____________
View Answer & ExplanationQuestion 253:
The number of input combination for a 4 input gate is ____________
View Answer & ExplanationQuestion 255:
A collection of facts and figures is known to be ____________
View Answer & Explanation